Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings: Lecture Notes in Computer Science, cartea 6163
Editat de Liqun Chen, Moti Yungen Limba Engleză Paperback – 15 iul 2010
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 330.57 lei 3-5 săpt. | |
Springer Berlin, Heidelberg – 15 iul 2010 | 330.57 lei 3-5 săpt. | |
Springer Berlin, Heidelberg – 18 noi 2011 | 330.71 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1043.63 lei
- 20% Preț: 334.61 lei
- 20% Preț: 336.22 lei
- 20% Preț: 445.69 lei
- 20% Preț: 238.01 lei
- 20% Preț: 334.61 lei
- 20% Preț: 438.69 lei
- Preț: 442.03 lei
- 20% Preț: 337.87 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 634.41 lei
- 17% Preț: 427.22 lei
- 20% Preț: 643.99 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1057.10 lei
- 20% Preț: 581.55 lei
- Preț: 374.84 lei
- 20% Preț: 331.36 lei
- 15% Preț: 431.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1390.89 lei
- 20% Preț: 1007.16 lei
- 20% Preț: 569.54 lei
- 20% Preț: 575.48 lei
- 20% Preț: 573.59 lei
- 20% Preț: 750.35 lei
- 15% Preț: 570.71 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 347.59 lei
- 20% Preț: 576.02 lei
- Preț: 404.00 lei
- 20% Preț: 586.43 lei
- 20% Preț: 750.35 lei
- 20% Preț: 812.01 lei
- 20% Preț: 649.49 lei
- 20% Preț: 344.34 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 330.57 lei
Preț vechi: 413.22 lei
-20% Nou
Puncte Express: 496
Preț estimativ în valută:
63.29€ • 65.91$ • 52.51£
63.29€ • 65.91$ • 52.51£
Carte disponibilă
Livrare economică 24 ianuarie-07 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642145964
ISBN-10: 3642145965
Pagini: 277
Ilustrații: XIV, 263 p. 64 illus.
Greutate: 0.52 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642145965
Pagini: 277
Ilustrații: XIV, 263 p. 64 illus.
Greutate: 0.52 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talk.- On Design of a Trusted Software Base with Support of TPCM.- Secure Storage.- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.- Attestation.- Remote Attestation on Function Execution (Work-in-Progress).- Scalable Remote Attestation with Privacy Protection.- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation.- Trusted Network.- SocialClouds: Concept, Security Architecture and Some Mechanisms.- Privacy Enhanced Trusted Network Connect.- Research on Multistage Interconnection Architecture and Collision Detection Model.- Virtualization.- Trusted Virtual Domains – Design, Implementation and Lessons Learned.- Trusted Integrity Measurement and Reporting for Virtualized Platforms.- Applications.- A Feather-Weight Application Isolation Model.- Exploring Trust of Mobile Applications Based on User Behaviors.- Trusted Firmware Services Based on TPM.- Supporting Technology.- Improved Cryptanalysis of the FOX Block Cipher.- Bitwise Higher Order Differential Cryptanalysis.
Caracteristici
Up-to-date results Fast track conference proceedings State-of-the-art report
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2010, held in Beijing, China, in December 2010.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
The 23 revised full papers were carefully reviewd and selected from 66 submissions for inclusion in the book. The papers are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.